BLOG   |   CONTACT US   |   KOREAN       JAPANESE 
HOME
HOME
>
SOLUTIONS
>
Personal Information Leakage Prevention

Personal information leakage prevention

An integrated solution for personal information and customer information leakage prevention

SoftCamp offers an integrated security solution that prevents leakage of personal/client information. Moreover SoftCamp’s integrated security solution operates in accordance with the rules such as Personal Information Protection Act, Act on Promotion of Information and Communications Network Utilization and Information Protection etc.

Necessity

  • Do you have legal concerns regarding regulations such as the Personal Information Protection Act, the Act on Promotion of Information and Communications Network Utilization and Information Protection etc.?
  • Do you need a secure way to distribute large amount of customer information to DM and TM companies?
  • Do you want to protect important internal information when outside personnel operate while connected to your internal system?

Issues

  • Unable to properly respond to compliance issues arising from encryption by simple personal information search
  • Inconvenience resulting from manual encryption
  • Lack of precautionary measure for personal information leakage while conducting statistical analysis and for large DB
  • Data security for statistical software (SPSS, SAS etc.)
  • Other issues remain, including not encrypting personal information delivered to partners and permanent disposal issues after cooperation etc.

Relevant Laws

  • Article 24 of Personal Information Protection Act (Limitation to Processing Unique Identifier)

    In case the personal information processor processes the Unique Identifiers pursuant to each Subparagraph of Paragraph (1), the personal information processor shall take necessary measures to ensure the safety including encryption, as stated by the Presidential Decree, so that such Unique Identifiers may not be lost, stolen, leaked, altered or damaged.

  • Article 29 of Personal Information Protection Act (Duty of Safeguards)

    The personal information processor shall take such technical, managerial and physical measures as internal management plan and preservation of log-on records, etc. necessary to ensure the safety as specified by the Presidential Decree so that personal information may not be lost, stolen, leaked, altered or damaged.

  • Article 7 (Personal Information Encryption)

    The personal information processor shall utilize encryption algorithm or commercial encryption solution when saving or managing Unique Identifiers in office computers.

  • Article 16 of the Law on the Protection and Use of Location Information (Protection of location information, etc.)

    ① Each location information provider, etc. shall take managerial measures, such as establishing guidelines on processing and management of location information to prevent the leakage, alteration, impairment, etc. of location information or designating those with access authority, and take technical measures, such as installing a firewall or using encryption software.

  • Article 47-3 of the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc. (Certification of Management System for Protection of Personal Information)

    Article 47-3 of the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc. (Certification of Management System for Protection of Personal Information)

  • Article 6 of the Standards for Technical and Administrative Measures for Personal Information Protection announced by the Korea Communications Commission (Personal Information Encryption)

    Information and communications service providers, etc. shall encrypt users’ personal information when saving the information in personal computer (PC).

Solutions

  • Our products search for the presence of personal information and either encrypts the document or stores to a secure encrypted area.
  • Strengthened security with encrypted environment for large customer information DB operations
  • Encrypted environment provided for external transmission of documents with personal information
  • Inspection available after lifting security on encrypted files after release approval procedure
솔루션 정보
상품 방안
Document
Security
for Privacy
  • Searches for data containing personal information and encrypts the document afterwards
  • Prohibits certain activities on encrypted documents even for authorized users (decrypt/print/export etc.)
S-Work
for Privacy
  • Searches for data containing personal information and stores the document in a secure encrypted area
  • Obligates saving to secure area for large customer information DB operations
Approval
Management
System
  • Lifts security (decrypt) on encrypted files for external transmission thru approval procedure and strengthens inspection by storing the original copy
S-work
for Storage
  • Searches for data containing personal information and stores the document in a file server thus prevents documents from being saved to personal PC
Linker /
Service Linker,
S-Work Linker
  • Obligates saving personal information to a secure area with API and trunk system
  • For general work systems, encrypted saving is supported through interconnecting
Secure
Keystroke
  • Prevents leakage of keyboard input data through encryption

Expected Benefits

  • Able to set up systematic leakage prevention and inspection policy through identifying personal information usage and present condition
  • Scans for unnecessary customer information and prevents data leakage for personal information processors
  • Controls user authority over document and further strengthens security by interconnecting with document/area security
  • Tightened inspection on the release of personal information on printed materials and release approvals